CVE-2016-8629

Red Hat Keycloak before version 2.4.0 did not correctly check permissions when handling service account user deletion requests sent to the rest server. An attacker with service account authentication could use this flaw to bypass normal permissions and delete users in a separate realm.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign_on:7.2:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2017-0876.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2017-0876.html - Third Party Advisory
References () http://www.securityfocus.com/bid/97392 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/97392 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038180 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038180 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2017:0872 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:0872 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2017:0873 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2017:0873 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1388988 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1388988 - Issue Tracking

Information

Published : 2018-03-12 15:29

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8629

Mitre link : CVE-2016-8629

CVE.ORG link : CVE-2016-8629


JSON object : View

Products Affected

redhat

  • keycloak
  • single_sign_on
  • enterprise_linux_server
CWE
CWE-284

Improper Access Control

CWE-264

Permissions, Privileges, and Access Controls